Forum Discussion
False positive ASM block
ASM security policy blocking the request as it is detecting an attack in the content.ASM is blocking because of cross site scripting attack. Subscriber names are coming in HTTP request. eg.Shelly. ASM is detecting as it as "shell" and blocking the request. Details of attack are violation as url shell parameter and attack cross site scripting. Is there any way to exclude these parameters(url, shell) We don't want to disable whole XSS signature attack.
1 Reply
- Cory_50405
Noctilucent
Yep. Navigate to Application Security -> Parameters -> Parameters List and then select the policy you wish to edit. Create a new parameter, name it appropriately, and set it to a user-input value. Then at the bottom, click the attack signatures tab and select the signature that is incorrectly firing on the parameter and move it over to the overriden security policy settings pane. Ensure the dropdown for this signature says disabled.
This will disable the attack signature only for the specific parameter.
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com